DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
SEARCH
Current Location:
>
> This Story


Log in or Register to rate this News Story
Forward Printable StoryPrint Comment

 

 

Health IT Homepage

Change Healthcare unveils InterQual 2018 Supports decision-making by providing updated and enhanced clinical criteria

MRI Interventions and Voyager Therapeutics partner on Parkinson's therapy Bringing real-time MR guidance to minimally-invasive neurosurgical devices

Three ways providers can improve patient satisfaction with online forms Tips for simplifying a historically tedious process

Boston Children's Hospital quickens medical image processing in RedHat and MOC collab Decreases time it takes to diagnose and commence treatment

Cerner head suggests negative reports about DoD contract may be 'fake news' Suggests competitors may have played role in bad publicity

NextGen Enterprise EHR now a live implementer of Carequality Framework Creating a more interoperable healthcare system

What you need to know about the latest Philips, Silex and GE hack vulnerabilities Homeland Security announces new cyber alerts with familiar calling cards

How diverse technology can drive improvements in population health Interacting with patients in low cost settings

Q&A with Dr. James Whitfill, incoming chair of SIIM The imaging informatics expert on the upcoming meeting and the ongoing convergence of imaging and IT

Glassbeam inks new partnerships for its imaging equipment analytics solution Ensuring maximum uptime for MR, CT and more

Baystate Health hit by 'phishing' attack

by Thomas Dworetzky , Contributing Reporter
Another day, another patient-privacy cybercrime.

Baystate Health in Massachusetts announced this week that on August 22, it “learned that a phishing email had been sent to several Baystate employees allowing hackers to access some employees’ email accounts.”

Story Continues Below Advertisement

Servicing GE Nuclear Medicine equipment with OEM trained engineers

We offer full service contracts, PM contracts, rapid response, time and material,camera relocation. Nuclear medicine equipment service provider since 1975. Click or call now for more information 800 96 NUMED



The email looked like a regular “internal Baystate memo to employees.”

Email accounts were secured when the breach was discovered and an investigation begun.

In total, five Baystate employees responded to the email — which let hackers gain access to their accounts. Information on 13,000 patients was contained in the emails exposed to the cyber-invaders.

“What we need to do and what we can do every day going forward, is train and retrain, and educate and reeducate our workforce,” Baystate Health Media Spokesman Brendan Monahan told WWLP news following the incident. “So when one of these phishing attacks comes in, they know what it looks like and they’re not tempted to click on it.”

“While we have no evidence that any patient information has been taken or misused, we want to assure our patients that we take this incident very seriously,” said Baystate, adding that the hackers may have had access to patients’ names, birth dates, diagnosis, treatment received, medical record number and, in some instances, health insurance identification number.

No Social Security numbers, credit card numbers or other financial information was exposed and no patient medical records were accessed.

Letters were sent Oct. 21 to those possibly affected.

This is just the latest in an ongoing cyber-assault on health care providers.

In August, Arizona-based Banner Health reported that a massive data hack beginning June 17 had affected the records of as many as 3.7 million individuals who were patients, health insurance plan members, food and drink customers, doctors, and others.

The attack was unearthed by Banner on July 7, 2016, when it determined that attackers may have gained unauthorized access to computer systems that process payment card data at food and beverage outlets at some Banner Health locations.

“The attackers targeted payment card data, including cardholder name, card number, expiration date and internal verification code, as the data was being routed through affected payment processing systems,” Banner stated.

In February, Hollywood Presbyterian Medical Center in Los Angeles paid hackers $17,000 ransom to reclaim its computer network after an attack.
  Pages: 1 - 2 >>

Health IT Homepage


You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2018 DOTmed.com, Inc.
ALL RIGHTS RESERVED